Font Size: a A A

Smart Ic Card In The Tax Invoice Management System Study

Posted on:2006-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:W W ZhangFull Text:PDF
GTID:2208360155466414Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The work of this paper aims at solving the security problems in management of the plain invoice area, by applying the smart IC card technology. Centred on the security analysis of the application system and its countermeasures. Currently, there are many leaks in the management of plain tax invoices because of the absence of encryption measures and means of intercrossed audition. To improve the level of management of taxation plain invoices by means of innovation in high technology, is an exigent problem currently.This paper focus on the research of the security problems and its countermeasures of the smart card application systems in the unreliable customer environments. Secure state is the kernel of the smart card security systems, in the designing of smart cards applications. Changing the security state of smart cards need to use an external attesting process. The control of accessing to the internal data file of smart card completely depends on the attestation between the smart card and the application system. This method has the limitation that the smart card application environment must be reliable. This limitation allows attackers accessing the smart card data by hacking the external encryption key and data in memory . In order to resolve these security problems, multiple technique measures must be applied in every phase of the system designing process .The problem discussed in this article is a solution using the method of downloading codes to the smart cards to resolve the security leak.The program codes downloaded to the smart card can implement the atomic operations of data storage and encryption. It can avoid the risk of tampering with the data illegally.An designing thought of extending instructions for standard functions of smart cards is also being discussed in this paper. Using the extending instructions to implement the atomic operations of encryption and storage can make it easier to developing application systems , and the systems will have high secure level.
Keywords/Search Tags:Smart Card, Security, Invoice, Tax
PDF Full Text Request
Related items